Skip to main content

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CVE-2023-28430

Severity High
Score 8.1/10

Summary

OneSignal is an email, sms, push notification and in-app message service for mobile apps. The "Zapier.yml" workflow is triggered an issues "(types: [closed])" (i.e., when an Issue is closed). The workflow starts with full write-permissions GitHub repository token since the default workflow permissions on Organization/Repository level are set to read-write. This workflow runs the following step with data controlled by the comment "(${{ github.event.issue.title }} – the full title of the Issue)", allowing an attacker to take over the GitHub Runner and run custom commands, potentially stealing any secret (if used), or altering the repository. This issue was found with CodeQL using JavaScript’s Expression Injection in actions query. This issue has been addressed in the repositories GitHub action. No actions are required by users. This vulnerability affects react-native-onesignal versions prior to 4.5.1.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • LOW
  • HIGH
  • NONE

CWE-77 - Command Injection

A command injection attack involves injecting an operating system command through the data input, which gets executed on the host operating system with the privileges of the victimized application. The impact of a command injection attack may range from loss of data confidentiality and integrity to unauthorized remote access to the hosting system. The attack may cause serious data breaches and system takeover.

Advisory Timeline

  • Published